ExtraHop Takes On Real-Time Attacks with Threat ID Bundle

ExtraHop Threat ID analyzes east-west traffic within the data center, looking at common threat vectors.

July 13, 2017

3 Min Read
Network Analytics and Security

**Editor’s Note: Click here for our recently compiled list of new products and services.**

PRESS RELEASE — SEATTLE — ExtraHop, the leader in real-time IT analytics, today announced the release of its new Threat ID bundle, an extensible plug-in to the ExtraHop platform. ExtraHop Threat ID analyzes east-west traffic within the datacenter, looking at common threat vectors including certificates, ciphers, DNS, and scans. The bundle then maps them against known configurations to help improve the security posture of IT organizations by proactively identifying and managing potential threats within the environment.

Download the ExtraHop Threat ID bundle today.

Technology and organizational gaps between IT and security teams often mean that neither team has the visibility or resources they need to quickly identify and remediate threats before they turn into a major breach. ExtraHop bridges this gap with network traffic analytics and the new Threat ID bundle delivering real-time visibility into suspicious port scans, data exfiltration activity, or indicators of an active attack that make it past perimeter defenses. Examples of new capabilities include:

  • Instantly Detect Suspicious DNS Behavior and Scans: Threat ID surfaces suspicious DNS and port scanning behavior patterns, allowing users to rapidly identify potential threats quickly and initiate a targeted investigation.

  • Proactively Manage Certificates and Ciphers: Threat ID delivers a complete map of encryption certificate strength and usage for accurate risk profiling. The bundle automatically identifies weak ciphers and determines how they are being used to better assess risk. The bundle also tracks expiring, expired, and wildcard certificates that could put data at risk or impact service delivery, and audits usage of non-compliant and outdated transport layer security protocols such as SSLv3 or TLSv1.0.

Through the ExtraHop integration with ServiceNow, these types of anomalies automatically trigger alerts, kicking off a workflow in ServiceNow so security and IT operations teams can easily quarantine an infected client.

“Organizations recognize that perimeter and signature-based security are no longer effective on their own,” said Jesse Rothstein, CTO and co-founder, ExtraHop. “With Threat ID, ExtraHop is delivering real-time network-level visibility and threat identification that can help all security stakeholders—from security to IT ops—stay ahead of potential threats.”

The ExtraHop Threat ID bundle joins a constellation of extensible plug-ins from ExtraHop aimed at helping global enterprises improve their security posture with real-time insight and rapid remediation. The ExtraHop Ransomware bundle analyzes traffic from the SMB/CIFS network protocol to detect known ransomware file extensions and behavior patterns associated with the malware. The ExtraHop Active Directory bundle tracks user accounts, computer accounts, DNS, LDAP, global catalog, and group policy loads to help ensure security and compliance. Together, the Threat ID, Ransomware, and Active Directory bundles address critical blind spots in today’s IT environments and enable organizations to quickly enhance their security posture.

About ExtraHop
ExtraHop makes data-driven IT a reality. By applying real-time analytics and machine learning to all digital interactions on the network, ExtraHop delivers instant and definitive insights that help IT improve security, performance, and digital experience. Just ask the hundreds of global ExtraHop customers, including Sony, Lockheed Martin, Microsoft, Adobe, and Google. To experience the power of ExtraHop, explore our interactive online demo. Connect with us on Twitter, LinkedIn, and Facebook.

Source: ExtraHop

Read more about:

Agents
Free Newsletters for the Channel
Register for Your Free Newsletter Now

You May Also Like